Please enable JavaScript.
Coggle requires JavaScript to display documents.
FRAUD AND CYBERCRIME (week 9 :online fraud (TYPES (trickery, story based,…
FRAUD AND CYBERCRIME
week 9 :online fraud
online prey on greedy, gullible, vulnerable
access to many victims
multi jurisdiction
huge market place
anonymity
fraudulent sales
no auction/delivery
id theft
account verified not purchaser
popup
scare ware
advance fee fraud
common
pay upfront
rental scams
extortion
dating scams
romance fraud
compuetr suppourt scams
electronic funds transfer crime
moved in large amounts
unauthorised hack
inside job
fruadulent invstment
websites , chatrooms, email
TYPES
trickery
story based
employment based
obligation
appeals
merchant /customer based
marketing
financial and investment fraud
muling
tranfer funds
phising
spam email
online shopping
internet banking
investment fraud
investment fraud
When you get a cold call from a broker pretending to offer you the opportunity to invest in a variety of schemes or products that are either worthless or don’t even exist
It’s also known as share sale fraud, hedge fund fraud, land banking fraud or bond fraud
The majority of investment frauds are run out of offices known as cold calling or boiler rooms – typically starts with phone calls; but increasingly moving to online methods and tools to facilitate crime
tactics
overseas
fake website
fake social media
WEEK 1:INTRODUCTION
3 types of cc
cyber enabled
scale;force multiplyer
accessibity
anonymity
global reach
portability/transfer
absence of guardian
compute assisted
cyber dependant
challenges
scale
40% of worlds population
amount of crime online
accesibiity
easy to use
80% access to internet
phones online
anonymity
conceal id with proxy servers
fake emails, ip adresses
encryption
routed through different jurisdictions
portability
storage
global reach
absence of capable guardianship
4 modes of constarint
law
architecture
market
social norms
terrorism
network is critical structure
political, religious, idealogy
SCADA supervisry contol and datat aqusition
ICS industrail control sysytems attack (mumbai)
usually by state not grouo
2 types
tech used for terrosir activity/ gather intel
attacks must elements of terroism to be labelled cyber terroism
scale of the problem
no accurate figures
lack of consensus on meaning of cc
many cc are existing offences
under reporting
unskilled law enforcement
over/ under reporting
media reports
online offline consistency
enforcement
regulation
sanctions
virtual crimes
crime commited in cyberspace
criminal law grounded in physicl world
internal/ entered cyberspace; external physical space
online crime
sexual activity
agaist property
against person
global problem
individual, industry, law enforcemnt
Council of Europe Convention on Cyber Crime
1st binding multinational instrument to adress cc est July 2004.
cyber criminals targeting and purpose
criminal ex[loitation
gain access to data
disruptor damage systems
political gains
financial gains
fullfill human need
reduce tension
admiration
autonomy
sex
excitment
control
revenge
control resources
target individuals, corporates and states
elements of CC
organised
organised crime
ORGANIZATION LEADERS assemble the team and choose targets
CODERS write the exploits and malware
DISTRIBUTORS trade and sell stolen data
TECH EXPERTS maintain the criminal enterprise’s IT infrastructure
HACKERS search for and exploit vulnerabilities in applications, systems and networks
FRAUDSTERS woo potential victims with social engineering schemes like phishing and spam
HOSTED SYSTEM PROVIDERS offer illicit content servers
CASHIERS control drop accounts and provide names and accounts to other criminals for a fee
MONEY MULES complete wire transfers between bank accounts
TELLERS who transfer and launder illicit earnings through digital currency services
financially motvated
tech sophisticated
transnational
AUSTRALIAN CYBER CRIME ACT 2001
crimes targeting computer
hacking
crimes using computer
fraud
WEEK 8: IDENTITY FRAUD
Identity Crime
Refer to offences where the defendant uses a false identity to perpetrate the crime; can include money laundering, drug trafficking, tax evasion, terrorism
Identity Fraud
More specific form of identity crime where a false identity is used to gain money, goods, benefits and/or services
Fraudulent use of identity includes
impersonation or appropriation of a ‘real’ person identity;
complete fabrication of an identity;
someone who is complicit in the misuse of personal information
Identity Theft
The assumption of a pre-existing identity
stealing documents or data
aquire or replicate
id document or data
individual corporation
public available data
anonymity
Anonymity of the internet has facilitated crime volume, perpetration methods, contact with victims and difficulties in law enforcement
Level of anonymity and ability to ‘impersonate’ others in the virtual world had increased the importance of valid identification measures
Access to financial resources simply requires log in details and password
impersonation can be interpreted as taking on someone’s identity simply by using their log in information and password
offences based on
Possessing identity information
Dealing in identity information
Possession of equipment used to create identity information
Prevention – monitor credit reports
Incorrect listings can alert you to things like identity theft, where other people use your personal information for financial gain
Recommended that you check your credit report once per year; you are entitled to a free report once per year
Your personal details. Your name, date of birth, current and past addresses, employment and driver's licence number.
Your credit history.
Repayment history.
Other information. Bankruptcies (for up to seven years after they occurred), court judgments, debt agreements and personal insolvency agreements (for up to five years after they occurred).
identity restore
Need to identify the ‘damage’
Preventing further identity fraud in short and long term
Restoring identity and re-establishment
id info on human
what they know
what they have
physical characteristics
verification
biometric
fingerprint
attributes
dob
biographical/ passwords
employment
week 7: dark net and cp
five categories of seriousness
Images depicting erotic posing with no sexual activity
Sexual activity between children, or solo masturbation by a child
Non-penetrative sexual activity between adults and children
Penetrative sexual activity between children and adults
Sadism or bestiality
Oliver scale includes
anime, drawings
ignorable
non illegal
adult porn
Grooming
prepare kid for sexual activity
giving gifts or special attention to a child or young person, or their parent or carer
making close physical contact sexual, such as inappropriate tickling and wrestling/play fighting
openly or pretending to accidentally expose the victim to nudity, sexual material and sexual acts
controlling a child or young person through threats, force or use of authority making the child or young person fearful to report unwanted behaviour
stages
Friendship-forming
Relationship-forming
Risk-assessment
Exclusivity
Sexual
Fantasy reenactment
Damage limitation
prohibiting cp protects kids
weakens inhibition, distorts cognition
fuels fantasy
production/distribution reduced
used for grooming and seducing
acessory after the fact
reduce market and demand
medium
data
able to be converted into viewing form
communication
text
picture
control over the image
virtual cp
drawings
video
sound
specific offences
production
offering
distribution
procurring
possession
fantasy defence
adult pretending to eb child
week 4: victimisation theory
RAT
convergence in time and space
not in traditional sense but in cyberspace over networks
apsence of guardianship
personel
physical
social
motivated offender
rise in cyber crime
focus is on factors that increase victimisation not motives of offender
attractive target
ease of access
value
computer system or net work or people
social and tech change
life style exposure theory
exposur to people, places and timees
lifestyle
business
pleasure
education
exposure
opportunity model of victimology
RAT + lifestyle exposure
Structural factors
Proximity and exposure
pattern the nature of social interaction and predispose individuals to riskier situations
Choice factors
Target attractiveness and guardianship
Determine the selection of particular crime target within a sociospatial context
Particular environments increases one’s exposure and proximity to dangerous situations, BUT whether a person becomes a crime victim depends on their presumed subjective utility over alternative targets
routine activity and lifestyle increase the contact between the offender and the victim
factors)
visibility
information available
acessibility
lack privacy settings
exposure
timeonline
internet lifestyle
online banking
exposureto oppurtunity
victim can incite atack
factors that increase the risk of individual being victim of crime
theories about why some people commit crime more than others
WEEK6 HARASSMENT
harassment in cs
modern tech imediate and distance encourage harrasment
pattern of behaviour that distresses and intimidates
offend then regret
direct communication to friends, family, worker of victim,social networks
anonymity, different persona, pseudonymity
lack of personnel contact encourages fantasy
info online of victim
three components of online harassment
conduct element
pattern of conduct
2 or more acts
continuing purpose
repeatly follow
repeatly communicate
besetting watch house work
threatening conduct
unauthorized computer access
publish on net
tracing use of internet
survailence
fault element
intention, reckless
not all stalker want to inflict harm
menntal health
impact on victim
conduct must impact the victim
evidence they were harrased
alarmed distress
fear bodily harm injury to thereself or family
forms of harassment
four categories combine overlap with offline conventional
communicate with the victim
electronic
anomouse email, hidden numbers, bombard messages
usa first amendment, anti harrasment, true threats (real threats)
needs to be communicated to the Victim
"want", "would"
trolling, message, on user group with the intent to cause hostile or corrective response
social setting , deception, destructive, disruptive no no purpose
ongoing, offensive,distressing
amusemnet as motive
personality=noxiouse, sadistist,
publish info about the victim
humiliate the victim
easy
satisfy conduct element of harrasment
pattern conduct 2 0r more close in time
survailence, comunicate, visited
about the person rather than to them, 1st amendment concerns
if posting unknown to victims, difficult to establish elements or harassment
pulisher canget third parties to harras and intimidate the victim
visual recordings of criminal acts (form of harrasment)
revenge porn
sexting
image based abuse
sextortion
20%, mainly 18-25 yofemale victims
access target the computer
surveillance
keeps the victim under watch, easy with tech
gain info, connections
observe , monitor movements
stalking (constant surveillance)
if unknown to the victim, hard to establish fault, impact
cyber stalking
repeated unwanted intrussion and communication where fear of safety
motive
control
jelousy
resentment
obsession
desire
survailence
harrasing communication
publishing info
UK Protection from harrasment act
more than one ocasion
voilence will beused
alarm distress adverse effect on the victim
usa, kill, injure, intidate, harras, survailence
cyber bullying
tech
smartphones (82%)
mobile phone (82%)
social media (82%)
email (52%)
GPS tracking (29%)
abuse oif power
subcategory of harrasment
harmful deliberate messages
eight types
flamming
denigration
trickery
outing
impersonating
exclude
harrass
stalk
Prevalence
About one in six will experience cyber bullying in their lifetime – statistics vary…
Victims
Females more likely to be victims (though inconclusive)
Age with older youth more likely to be cyber bullied
Spending more time on social networking sites
Revealing more information about yourself online
Being bullied in physical world predictive of being bullied in cyber space
prevention
talk to someone you trust
don’t retaliate or respond
block the bully and change your privacy settings
report the abuse to the service and get others to as well
collect the evidence
do something you enjoy
remember you didn’t ask for this
forms of tech abuse
Hacking into someone’s personal email account, computer or phone
Using tracking devices to monitor someone’s location, phone calls and messages
Monitoring interactions on social media
Demanding to know passwords
Distributing humiliating, false or intimate videos or photos without consent
Sending messages, emails or texts that are abusive, intimidating or threatening
Stealing a person’s identity or impersonating them
obstacles
Traditional obstacles to offending – physical and psychological
Immediacy & Distance
Volume of victims targeted simultaneously
Direct contact with victim
Mobbing behaviour
Availability of information about the victims and/or their behaviours that facilitate and/or incite harassment or bullying
Anonymity of offenders – reduces detection but also, loss of social inhibitions and constraints
Psuedo-anonymity – adoption of different persona
WEEK 11: policing the internet
involvement
extralegal
legal
entities
actors
ISP
corporate security personel
co ordinated government or non government entities
commonwealth plan
The plan commits Australian governments to taking concrete steps under six key priorities:
educating the community to protect themselves
partnering with industry to tackle the shared problem of cybercrime
fostering an intelligence-led approach and better information sharing
improving the capacity and capability of our agencies to address cybercrime
strengthening international engagement on cybercrime
ensuring our criminal justice framework keeps pace with technological change.
regulators
CERT computer emergence response team
law enforcemnet
CSR corporate social responsibilities
reactive/ proactive responce investigation
90% of cybercrime is reported by individuals or corporate victims to law enforcement; a reactive response
Reactive investigations
Initial report to police is often to general duties – little or not knowledge of investigating cyber crimes
Need to upskill detectives in local areas
Typically, referred to central cyber crime investigation unit
Investigation
who, what , where, how, when
Step 1: Initial investigation
Step 2: Tracking down the intruder
Step 3: Closing in on the intruder
Step 4: The arrest
To understand how the intruder is entering the system
To obtain the information you need to justify a trap and trace the access of the intrusion
To discover why the intruder has chosen the victim’s computer
To gather as much evidence of the intrusion as possible
To obtain information that may narrow your list of suspects, or at least confirm that the intruder is not a current employee
To document the damage to the victim caused by the intruder, including the time and effort spent by the victim in investigating the incident and determining the amount of damage to its computer
preventing CC
SCP
reduce rewards
remove excuses
increase effort
target harden
increase risks
commonwealth and state gov
JURISDICTION
prescription
sovereign territory
territorial principle in exterritorial situations
ships, aircraft
objective territorality outside jur but effects victim from juridiction
nationality principle , offender fronm nation
conduct must be punishible by the nation of offender
modern communication in/from, air, water, atmosphere, under water ,under ground
teritirial principle does not apply to satellites
must originate and terminate in terrestrial location
must be significant link to jurisdiction
commonwealth in charge of communication in aus
adaptive
court jur
need access tocyberspace through computer
the geographical location of servers and computer can determine jurisdictionfor prosecution
jur may depend on the terms of the relevant legislation
emission theory and reception theory not applicablwe to network communications
claims of jur by one country may deny another country
need for mutual respect not to interfer with internal affairs of other states
excercise of jurisdiction must be reasonable
relevant factors
location of offence
location of the victims
degree of harm
location of the evidence
level of punishment
resolve with enforcemnet jur
enforcement
canonly apply within jur
have access to offender
extradition
state enforced return of offender
international agreement not law
obligation to extradite or prosecute
must be offense in both countries (dual criminality)
week 10:Globalisation of cybercrime
cyberwarfare: attack by state
cyber terrorism: directed at state instead of corporation, individual or group is offended.
Use of the internet
Propaganda/publicity
Fundraising
Information dissemination
Secure communications
attack CI, financial instutes, defence , security, utilities
Hacking – stealing data; disruption or altering data or systems/processes controlled by central system
DDoS
Web defacements
Hacktivism – lower end of scale…
Political activism
Yar (2013) similar to civil rights movements but replicated in cyberspace (but civil rights has more positive connotations)
Involves 4 behaviours: Virtual sit-ins, Email bombs, Website defacement, Malware
Others believe it is more complicated
Website defacement; information theft; website parodies; DoS; virtual sit-ins; virtual sabotage
international cooperation
The Group of 20 major economic powers have stepped up its fight against terrorism with US President Donald Trump and Russian President Vladimir Putin agreeing to create a bilateral working group to address cybersecurity
Under their plan, the G20 wanted to call on internet providers to act quickly to remove terrorist content on their internet platforms
G20 members wanted to make clear that they "expect such things to be deleted quickly" adding that such matters were "time-sensitive" when it comes to terrorist propaganda
The G20 is also planning action to crack down on the financial sources for terrorists, underlining the sense of urgency about the anti-terrorist fight by including in its final declaration
prevention
security by CI
Joint Counter Terrorism Team (JCTT)
regulate monitor websites
situational crime prevention and target hardening
Clarke and Newman – applied SCP to ‘physical’ terrorism
Need to Identify and Assess High Risk Targets
Assessment can be undertaken with the EVIL DONE framework
E xposed (the Twin Towers of the World Trade Center were sitting ducks)
V ital (electricity grids, transportation systems, communications)
I conic (of symbolic value to the enemy, e.g. Buckingham Place, Statue of Liberty)
L egitimate (terrorists' sympathizers cheered when Twin Towers collapsed)
D estructible (the Twin Towers were thought to be indestructible, but not by the 9/11 hijackers)
O ccupied (Kill as many people as possible)
N ear (Within reach of terrorist group, close to home)
E asy (the Murrah building in Oklahoma City was an easy target for McVeigh's car bomb placed within eight feet of its perimeter
week 2: impact and scale of fraud and cc
not a victim less crime
factors
age
social staus
networks
gender
vulnerability
ability to cope
eduction
criminal and civil
reputaion
trust
celebrity
finacial loss
psych
beahiour change
relationships
physical health
mental health
suicide
people online
In 2016, UN report estimates that 47% of the world’s people now use the Internet
40% in Developing Countries & 15% in the Least Developed Countries
Europe = 79.1%
The Americas = 65%
Asia & the Pacific = 41.9%
84% of the global population lived in an area where mobile-broadband is available
Australia
The top three scam categories reported to the ACCC
phishing (attempts to gain personal information)
advance fee frauds (send money up-front to receive a reward)
false billing scams
romance and investment scams in aus most reported $42 and $59 million
females and those aged 65+ most victimised
business and government
90% attempted, succesful cc 2015-16
58% successful
86% attempts
under reporting
report to who?
insinnificant loss
embarresed
no action taken
crime not categorised
different agencies
jurisdiction
week 3: theory: general theories and new theory
general theory of crime: GTC
self control, offenders are rational thinkers
pleasure and pain
low self control
impulsive
insensitive
physical
risk takers
short sighted
non verbal
all deviance ids imprudent beahviour
low self control
poor parenting
monitor children
emotional bond
analysis behaviour
correct behaviour
needds to be done until between 8-10 yo
if not results in criminal beahviour
drink
drugs
gamble
children out of wedlock
sex deviant
antisocial beahviour
Goftfredson + Hirshi
in cyber space
deviant behaviour
crime
positive link between online deviance and low self control
posting harmful material
excluding
illegal upload/download
threats insults
drug sales
research has not shown positive link with low self control and WCC
planned
skilled
no imediate gratification
SLT
SLT
social structure and learning
exposure to deviance
defiantions
learn
ron akers
components
imitation
differential reinforcement
diffferential assocation
frequency
priority
duration
intensity
most influential are people closest
definations
examples
neutralise
justify
influence future behaviour
social structure
differential
social systems
population density
demographics
distribution
culture
economics
levels
differential location
individual
micro
gender
age
role
status
social structure
crimerates
anomie
class opression
social disorganisation
primary secondary refference groups
family
friends
organisation
others that encourage deviance
effect involvent in cyber crimeif individiduals are placed inn enviroment and situations that increase exposure to deviant association and behaviour
hackers exchange ideas in virtual /physical world
hacker sub culture share knowledge, imitaion, reinforcement, assocation, definations
sutherlands differentail assocataion theory
nine propositions
criminal beahgiour islearned
communication
techinques
intimatt groups
favourable definations
excess def results in crime
assocation
expression of needs and values
frequency
SPACE TRANSITION THEORY STT
conforming non conforming behaviour in physical and cyber space
movement across different spaces
behavour is different in different spaces
K Jaishashar
repressed criminal behaviur
no stigmatisation in cyberspace(mask)
cannot express in cyberspace
propositions
persons with repressed criminal behaviour in physical space have a propensenity to commit crime in cyberspace
staus
stigmatisation
calculate risk
values
embarrasment
identity flexibility and disassocative annonymity
disinhitation effect
brutally honest
attack
seperate id
void consequence
no responcibo\lity
avatar
de individualse
no deterence
crimianl behaviour of offenders in cyberspace is likely to transition into physical and vice versa
low risk
more rewards
difficault law enforcement
crack down on physical crime pushed offenders into cyberspace
anaymity
intermittent ventures and temporal dynamic of cyberspace allows offenders to escape
people dont live in cyberspace
move locations
little adherence to spatial temporal restfrictions
reduce geography
hard to map
strangers will unite in cyberspace to commit crime; assocaites in crime unite in physical to commit crime in cyberspace
persons from closed society are more likely to ffend in cyberspacethen people from open society
closed society cannot vent anger
conflict of norms and values in cyber and physical worlds
international
societal difference
week5:cybercrime computer as target
hacking
access
impairment
interception
inside outside
types
unauthorised access
sphisticated
basic
password
admin remote access
access to info
intellectual
military
gov
personel
email
scan for vulnerabilty
modify/impede
delete
alter
destroy
damage
reprogramme
instal malware
financial advantage
surpression
interfer
i not just computers buta lso storge devices and networks mpairment
breach
What data is valuable?
Personally Identifiable Information (PII) (to commit identity fraud; file tax returns, apply for loans & credit cards; launch phishing attacks)
Financial data
Credentials (stealing intellectual property, espionage, launch phishing attacks)
human error
`examples
Examples of a data breach include when:
a device containing customers’ personal information is lost or stolen
a database containing personal information is hacked
personal information is mistakenly provided to the wrong person
eligibility
An eligible data breach arises when the following three criteria are satisfied:
there is unauthorised access to or unauthorised disclosure of personal information, or a loss of personal information, that an entity holds
this is likely to result in serious harm to one or more individuals, and
Whether a data breach is likely to result in serious harm requires an objective assessment, determined from the viewpoint of a reasonable person in the entity’s position
the entity has not been able to prevent the likely risk of serious harm with remedial action
use of computer
unathurised use
gain services
wifi hack
use of network
conceal activity
point of entry
intercept communications
UIT (uninetinal insider threats
Improper of Accidental Disposal of Physical Records
lost, discarded, or stolen nonelectronic records, such as paper documents
Loss of Portable Equipment
lost, discarded, or stolen data storage device, such as a laptop, PDA, smart phone, portable memory device, CD, hard drive, or data tape
Accidental Disclosure
sensitive information posted publicly on
a website; mishandled; sent to the wrong party via email, fax, or mail
Hack or Malicious Code
an outsider’s electronic entry acquired through social engineering (e.g., phishing email attack, planted or unauthorized USB drive) and carried out via software, such as malware and spyware
social engineer
spear phising
maliciouse
software
virus
infects other programmes
worms
self replicate
trojan
innocent looking programes
hidden fuction
embedded in software, email, website
capture key strokes
disable antivirus software
adware
spyware
monitore use
addware
pop ups
intercept data
browser hijak
covert survailence
record calls, messages etc
gather info for fraud
mobilphone hack
survailence
impersonation
ransomeware
bots
infect allow remote acceess
DOS attack
deny services
similar to flood of requests DOS
email attack
Extortion— Cyber criminals have been known to follow a DDoS attack with a ransom note, demanding money in exchange for stopping the attacks
Business competition — DDoS attacks can be used by people to make the website of their competition to crash
Script kiddies — These type of DDoS attacks are performed by cyber vandals using premade scripts and tools disrupt internet users — usually online gamers
restricted access
code
tech barrier
contract
use of service
terms and conditions
formal/informal
employment cotract
accepted use
policies
terms of use
license agreement
motive may not be ahrm
exceed authorised access
scope of authorisation
permission
purpose
exceed limits
inside outside ahcks
fault element
catch all
non intentional, careless, stupid
knowingly
secure access
intention
additional elements
cause harm
damage
typreof info
misuse of device
black market for hack tools
use for crime
production / scale/ use/import/distribution
possesion
storage
documents
compuyer
produce/supple/ 0btain data